Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
CVE-2023-27522
7.5HIGH
Summary
An HTTP Response Smuggling vulnerability exists within the Apache HTTP Server, specifically when using the mod_proxy_uwsgi module. This issue allows attackers to manipulate the origin response header by using special characters, potentially resulting in the truncation or improper splitting of responses forwarded to clients. Versions affected include Apache HTTP Server from 2.4.30 to 2.4.55, posing a risk to the integrity of web transactions and communications.
Affected Version(s)
Apache HTTP Server 2.4.30 <= 2.4.55
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Dimas Fariski Setyawan Putra (nyxsorcerer)